The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase elliptic-curve (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1989-1992 (22) 1993-1996 (17) 1997-1998 (40) 1999 (21) 2000 (24) 2001 (65) 2002 (73) 2003 (93) 2004 (120) 2005 (121) 2006 (134) 2007 (143) 2008 (163) 2009 (130) 2010 (81) 2011 (88) 2012 (70) 2013 (89) 2014 (89) 2015 (98) 2016 (90) 2017 (80) 2018 (71) 2019 (89) 2020 (89) 2021 (92) 2022 (87) 2023 (81) 2024 (23)
Publication types (Num. hits)
article(1077) book(1) data(1) incollection(27) inproceedings(1256) phdthesis(21)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 1381 occurrences of 405 keywords

Results
Found 2383 publication records. Showing 2383 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
192Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano Characterization of Elliptic Curve Traces under FR-Reduction. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF FR-reduction, trace, elliptic curve cryptosystems, number theory
109Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. Search on Bibsonomy CHES The full citation details ... 2000 DBLP  DOI  BibTeX  RDF elliptic scalar multiplication over tex2html_wrap_inline100, IEEE P1363, Elliptic curve cryptography (ECC), multiplier, coprocessor, Koblitz curve
108Kirsten Eisenträger, Kristin E. Lauter, Peter L. Montgomery Fast Elliptic Curve Arithmetic and Improved Weil Pairing Evaluation. Search on Bibsonomy CT-RSA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF elliptic curve arithmetic, Elliptic curve cryptosystem, scalar multiplication, pairing-based cryptosystem, ECM
97R. Balasubramanian, Neal Koblitz The Improbability That an Elliptic Curve Has Subexponential Discrete Log Problem under the Menezes - Okamoto - Vanstone Algorithm. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Elliptic curve, Elliptic curve, Discrete logarithm, Discrete logarithm, Key words, Weil pairing, Weil pairing
96Qi Cheng 0001, Ming-Deh A. Huang On Partial Lifting and the Elliptic Curve Discrete Logarithm Problem. Search on Bibsonomy ISAAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF partiallifting, Elliptic curve cryptosystem, discrete logarithm
96Edlyn Teske An Elliptic Curve Trapdoor System. Search on Bibsonomy J. Cryptol. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Weil descent, Elliptic curve cryptography, Key escrow, Isogenies, Trapdoor functions
94Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica 0001 A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Weil descent, fast performance, Finite fields, elliptic curve cryptography
93Neal Koblitz Constructing Elliptic Curve Cryptosystems in Characteristic 2. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
89Jun Yang, Xianze Yang Implementing Multi-party Key Exchange by Linear Combination of Elliptic Curve Points. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tripartite key agreement protocol, public key cryptography, elliptic curve, matrix, discrete logarithm problem, optimal extension field
87Toru Akishita, Tsuyoshi Takagi On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. Search on Bibsonomy Public Key Cryptography The full citation details ... 2004 DBLP  DOI  BibTeX  RDF zero-value point attack, side channel attack, elliptic curve cryptosystems, isomorphism, isogeny
85Tetsuya Izu, Tsuyoshi Takagi Exceptional Procedure Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF exceptional procedure attack, exceptional point, side channel attack, Elliptic curve cryptosystem (ECC), scalar multiplication
83Hyun Min Choi, Chun Pyo Hong, Chang Hoon Kim High Performance Elliptic Curve Cryptographic Processor Over GF(2^163). Search on Bibsonomy DELTA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptographic Processor, VLSI, Finite Field, Elliptic Curve Cryptosystem, Gaussian Normal Basis
83Neal Koblitz An Elliptic Curve Implementation of the Finite Field Digital Signature Algorithm. Search on Bibsonomy CRYPTO The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Supersingular, Nonadjacent Form, Digital Signature, Elliptic Curve
82Mathieu Ciet, Marc Joye (Virtually) Free Randomization Techniques for Elliptic Curve Cryptography. Search on Bibsonomy ICICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
76Christophe Doche, Thomas Icart, David R. Kohel Efficient Scalar Multiplication by Isogeny Decompositions. Search on Bibsonomy Public Key Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fast arithmetic, efficiently computable isogenies, efficient tripling, ?-adic, Elliptic curve cryptography
76Yasuyuki Sakai, Kouichi Sakurai Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars. Search on Bibsonomy ISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Elliptic Curve Cryptosystems, Scalar Multiplication
76Johannes Blömer, Martin Otto 0002, Jean-Pierre Seifert Sign Change Fault Attacks on Elliptic Curve Cryptosystems. Search on Bibsonomy FDTC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF elliptic curve cryptosystem, smartcards, fault attacks
76Nils Gura, Hans Eberle, Sheueling Chang Shantz Generic implementations of elliptic curve cryptography using partial reduction. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF elliptic curve cryptography, modular reduction
76Kyungah Shim Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms in a Finite Field. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Anomalous curve, supersingular curve, elliptic curve discrete logarithm, Weil pairing
76Qi Cheng 0001, Ming-Deh A. Huang Partial Lifting and the Elliptic Curve Discrete Logarithm Problem. Search on Bibsonomy Algorithmica The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
74Yasuyuki Sakai, Kouichi Sakurai On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Montgomery form, Multidoubling, Elliptic curve cryptosystems, Scalar multiplication, Fast implementation
74Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Montgomery Form, Randomized Projective Coordinates, Side Channel Attacks, Elliptic Curve Cryptosystem
73Maurice Keller, Andrew Byrne, William P. Marnane Elliptic Curve Cryptography on FPGA for Low-Power Applications. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF FPGA, low-power, Cryptography, elliptic curves
73Masaaki Shirase, Yasushi Hibino An architecture for elliptic curve cryptograph computation. Search on Bibsonomy SIGARCH Comput. Archit. News The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
73Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
72Yong Ki Lee, Ingrid Verbauwhede A Compact Architecture for Montgomery Elliptic Curve Scalar Multiplication Processor. Search on Bibsonomy WISA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Compact Elliptic Curve Processor, Montgomery Scalar Multiplication
72Katja Schmidt-Samoa, Olivier Semay, Tsuyoshi Takagi Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2006 DBLP  DOI  BibTeX  RDF elliptic curve scalar multiplication, signed binary representations, Public key cryptosystems, algorithm design and analysis
72Christophe Doche, Laurent Imbert Extended Double-Base Number System with Applications to Elliptic Curve Cryptography. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Elliptic curve cryptography, Double-base number system
72Jun-Cheol Jeon, Kee-Young Yoo An Evolutionary Approach to the Design of Cellular Automata Architecture for Multiplication in Elliptic Curve Cryptography over Finite Fields. Search on Bibsonomy PRICAI The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Evolutionary Computation, Cellular Automata, Finite Fields, Elliptic Curve Cryptography, Multiplication, Irreducible Polynomial
72M. Ernst, Michael Jung 0002, Felix Madlener, Sorin A. Huss, Rainer Blümel A Reconfigurable System on Chip Implementation for Elliptic Curve Cryptography over GF(2n). Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF $ mathbb {GF}(2^n)$ arithmetic, Karatsuba multiplication, VHDL model generator, coprocessor synthesis, FPGA hardware acceleration, Atmel FPSLIC platform, Elliptic Curve cryptography
72Tetsutaro Kobayashi, Hikaru Morita, Kunio Kobayashi, Fumitaka Hoshino Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF OEF, Table reference method, Finite field, Elliptic curve cryptosystem, Scalar multiplication, Frobenius map
71Louis Goubin A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems. Search on Bibsonomy Public Key Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Side-channel attacks, Public-key cryptography, Elliptic curves, Differential Power Analysis (DPA), Power Analysis, Smartcards
70Santosh Ghosh, Monjur Alam, Dipanwita Roy Chowdhury, Indranil Sengupta 0001 A GF(p) elliptic curve group operator resistant against side channel attacks. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF gf(p) elliptic curve, elliptic curve cryptosystem, side-channel analysis, timing attack, power analysis attack
70Dong-Ho Lee, Jong-Soo Oh Multi-segment GF(2m) multiplication and its application to elliptic curve cryptography. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF elliptic curve scalar multiplication, FPGA, elliptic curve cryptography (ECC), coprocessor, finite field multiplication
69Mathieu Ciet, Jean-Jacques Quisquater, Francesco Sica 0001 Preventing Differential Analysis in GLV Elliptic Curve Scalar Multiplication. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF fast computation, Public key cryptography, differential power analysis, elliptic curve cryptosystem
69Kimmo U. Järvinen, Jorma Skyttä On Parallelization of High-Speed Processors for Elliptic Curve Cryptography. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
69Atsuko Miyaji On Ordinary Elliptic Curve Cryptosystems. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
69Apostolos P. Fournaris, Odysseas G. Koufopavlou Creating an Elliptic Curve arithmetic unit for use in elliptic curve cryptography. Search on Bibsonomy ETFA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
67Hideyo Mamiya, Atsuko Miyaji, Hiroaki Morimoto Efficient Countermeasures against RPA, DPA, and SPA. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Elliptic curve exponentiation, ZPA, RPA, DPA, SPA
67Tim Güneysu, Christof Paar, Jan Pelzl Attacking elliptic curve cryptosystems with special-purpose hardware. Search on Bibsonomy FPGA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Pollard's Rho, cryptanalysis, elliptic curve cryptosystem, discrete logarithm
67Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF side channel attacks, elliptic curve cryptosystems, scalar multiplication, window method, memory constraints
67Richard Schroeppel, Cheryl L. Beaver, Rita Gonzales, Russell Miller 0001, Timothy Draelos A Low-Power Design for an Elliptic Curve Digital Signature Chip. Search on Bibsonomy CHES The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Optimal El Gamal, Characteristic 2, Field Towers, Trinomial Basis, Qsolve, Almost-Inverse Algorithm, Point Halving, Signed Sliding Window, GF(289), GF(2178), Low Power, Digital Signature, VHDL, Hardware, Elliptic Curve, ECDSA, Quadratic Equation
67Katsuyuki Okeya, Kouichi Sakurai Power Analysis Breaks Elliptic Curve Cryptosystems even Secure against the Timing Attack. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Montgomery-form, Scalar Multiplication Algorithm, Elliptic Curve Cryptosystem, Power Analysis, Timing Attack, Efficient Implementation
67Ingrid Biehl, Bernd Meyer 0002, Volker Müller 0001 Differential Fault Attacks on Elliptic Curve Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 2000 DBLP  DOI  BibTeX  RDF differential fault attack, elliptic curve cryptosystem
65Jean-Sébastien Coron, David M'Raïhi, Christophe Tymen Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF binary anomalous curve, accelerated signature schemes, Elliptic curve, scalar multiplication, pseudo-random generators
65Olivier Billet, Marc Joye The Jacobi Model of an Elliptic Curve and Side-Channel Analysis. Search on Bibsonomy AAECC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF unified addition formula, SPA-like attacks, smart cards, elliptic curve cryptosystems, side-channel analysis
65Jung Hee Cheon, Sung-Mo Park, Sangwoo Park, Daeho Kim Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
64Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Elliptic curve discrete logarithm problem (ecdlp), Baby-step giant-step method (bsgs), Pollards rho method, Fixed elliptic curve, Precomputation
64Murat Aydos, Tugrul Yanik, Çetin Kaya Koç An High-Speed ECC-based Wireless Authentication Protocol on an ARM Microprocessor. Search on Bibsonomy ACSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF high-speed ECC-based wireless authentication, ARM microprocessor, elliptic curve digital signature algorithm, ARM7TDMI processor, core processor, 80 MHz, 160 bit, mobile computing, elliptic curve cryptography, public key cryptography, software libraries, software library, authorisation, microprocessor chips, message authentication, portable computers, ECDSA, 32 bit, wireless applications
63Katherine E. Stange The Tate Pairing Via Elliptic Nets. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF elliptic divisibility sequence, elliptic net, Miller’s algorithm, elliptic curve, Tate pairing, pairing-based cryptography
62Kenli Li 0001, Shuting Zou, Jin Xu Fast Parallel Molecular Algorithms for DNA-Based Computation: Solving the Elliptic Curve Discrete Logarithm Problem over GF(2n). Search on Bibsonomy FBIT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
62Eiji Okamoto, Takeshi Okamoto Cryptosystems Based on Elliptic Curve Pairing. Search on Bibsonomy MDAI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key agreement scheme, privacy, pairing, ID based cryptosystem
62Arjen K. Lenstra Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
62Henri Cohen, Atsuko Miyaji, Takatoshi Ono Efficient Elliptic Curve Exponentiation Using Mixed Coordinates. Search on Bibsonomy ASIACRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
61Patrick Longa, Catherine H. Gebotys Novel Precomputation Schemes for Elliptic Curve Cryptosystems. Search on Bibsonomy ACNS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multiple scalar multiplication, precomputation scheme, conjugate addition, Elliptic curve cryptosystem, scalar multiplication
61Sameh M. Shohdy, Ashraf El-Sisi, Nabil A. Ismail FPGA Implementation of Elliptic Curve Point Multiplication over GF(2191). Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Karatsuba-Ofman multiplier, polynomial inversion, field programmable gate arrays, Elliptic curve cryptography, Galois field, polynomial multiplication
61Neil Costigan, Peter Schwabe Fast Elliptic-Curve Cryptography on the Cell Broadband Engine. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF elliptic-curve cryptography (ECC), Cell Broadband Engine, efficient implementation
61Tim Güneysu, Christof Paar, Jan Pelzl Special-Purpose Hardware for Solving the Elliptic Curve Discrete Logarithm Problem. Search on Bibsonomy ACM Trans. Reconfigurable Technol. Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Pollard's rho, cryptanalysis, elliptic curve cryptosystem, Discrete logarithm
61Guicheng Shen, Xuefeng Zheng Research on Implementation of Elliptic Curve Cryptosystem in E-Commerce. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Electronic Commerce, Information Security, Elliptic Curve Cryptosystem
61Erik Dahmen, Katsuyuki Okeya, Daniel Schepers Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography. Search on Bibsonomy ACISP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF affine coordinates, elliptic curve cryptosystem, scalar multiplication, precomputation
61Hüseyin Hisil, Gary Carter, Ed Dawson New Formulae for Efficient Elliptic Curve Arithmetic. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF efficient point multiplication, DBNS, Elliptic curve, tripling, doubling
61Daniel R. L. Brown, Kristian Gjøsteen A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator. Search on Bibsonomy CRYPTO The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Elliptic Curve Cryptography, Random Number Generation
61Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart Preneel, Ingrid Verbauwhede Low-Cost Elliptic Curve Cryptography for Wireless Sensor Networks. Search on Bibsonomy ESAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF sensor networks, authentication, pervasive computing, Elliptic Curve Cryptography, key-distribution, hardware implementation
61Selçuk Baktir, Berk Sunar Finite Field Polynomial Multiplication in the Frequency Domain with Application to Elliptic Curve Cryptography. Search on Bibsonomy ISCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF elliptic curve cryptography, DFT, Finite field multiplication
61Mathieu Ciet, Marc Joye Elliptic Curve Cryptosystems in the Presence of Permanent and Transient Faults. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF elliptic curve cryptography, fault attacks, fault analysis, information leakage
61Soonhak Kwon, Taekyoung Kwon 0002, Young-Ho Park 0001 New Architecture for Multiplication in GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF linear multiplier, NIST recommended binary fields, elliptic curve cryptography
61Stefan Tillich, Johann Großschädl A Simple Architectural Enhancement for Fast and Flexible Elliptic Curve Cryptography over Binary Finite Fields GF(2m). Search on Bibsonomy Asia-Pacific Computer Systems Architecture Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF application-specific instruction set extension, binary finite fields, SPARC V8, multiply step instruction, Elliptic curve cryptography
61Pradeep Kumar Mishra Pipelined Computation of Scalar Multiplication in Elliptic Curve Cryptosystems. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Jacobian coordinates, pipelining, Elliptic curve cryptosystems, scalar multiplication
61Soonhak Kwon, Kris Gaj, Chang Hoon Kim, Chun Pyo Hong Efficient Linear Array for Multiplication in GF(2m) Using a Normal Basis for Elliptic Curve Cryptography. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF finite field, elliptic curve cryptography, Massey-Omura multiplier, Gaussian normal basis, critical path delay
61Toru Akishita, Tsuyoshi Takagi Zero-Value Point Attacks on Elliptic Curve Cryptosystem. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF addition formula, zero-value register, side channel attack, differential power analysis, elliptic curve cryptosystem
61Adnan Abdul-Aziz Gutub, Mohammad K. Ibrahim Power-time flexible architecture for GF(2k) elliptic curve cryptosystem computation. Search on Bibsonomy ACM Great Lakes Symposium on VLSI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF crypto-systems power-time tradeoff, projective coordinate arithmetic, parallel architecture, elliptic curve cryptography
61Jean-Sébastien Coron Resistance against Differential Power Analysis for Elliptic Curve Cryptosystems. Search on Bibsonomy CHES The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Elliptic curve, power consumption, Differential Power Analysis
60Eric R. Verheul Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems. Search on Bibsonomy J. Cryptol. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Decision Diffie-Hellman problem, Supersingular elliptic curves, Inverting MOV embedding, Tripartite Diffie-Hellman key exchange, Escrow, XTR
60Marcus Bednara, M. Daldrup, Jürgen Teich, Joachim von zur Gathen, Jamshid Shokrollahi Tradeoff analysis of FPGA based elliptic curve cryptography. Search on Bibsonomy ISCAS (5) The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
60Michael J. Wiener, Robert J. Zuccherato Faster Attacks on Elliptic Curve Cryptosystems. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
58Teo Chun Yew, Hailiza Kamarulhaili, Putra Sumari Message Recovery Signature Scheme Using Complementary Elliptic Curves. Search on Bibsonomy GMAG The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Isomorphic Curves, Complementary Curves, Imbedding Plaintexts, Elliptic Curve Cryptosystems, Signature Scheme, Message Recovery
58Don Johnson, Alfred Menezes, Scott A. Vanstone The Elliptic Curve Digital Signature Algorithm (ECDSA). Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
58Toru Akishita Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
58Julio César López-Hernández, Ricardo Dahab Improved Algorithms for Elliptic Curve Arithmetic in GF(2n). Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
58Jorge Guajardo, Christof Paar Efficient Algorithms for Elliptic Curve Cryptosystems. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
58N. Demytko A New Elliptic Curve Based Analogue of RSA. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
58Gordon B. Agnew, Ronald C. Mullin, Scott A. Vanstone A Fast Elliptic Curve Cryptosystem. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
56Fanyu Kong, Daxing Li A Note on Signed Binary Window Algorithm for Elliptic Curve Cryptosystems. Search on Bibsonomy CANS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF signed window algorithm, elliptic curve cryptosystems, point multiplication, signed-digit number representations
56David R. Kohel The AGM-X0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting. Search on Bibsonomy ASIACRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF modular curves, point counting, Elliptic curve cryptography
56Hae Young Kim, Jung Youl Park, Jung Hee Cheon, Je Hong Park, Jae Heon Kim, Sang Geun Hahn Fast Elliptic Curve Point Counting Using Gaussian Normal Basis. Search on Bibsonomy ANTS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF order counting, elliptic curve, Gaussian normal basis
54Douglas Stebila, Nicolas Thériault Unified Point Addition Formulæ and Side-Channel Attacks. Search on Bibsonomy CHES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF unified point addition formulæ, projective coordinates, elliptic-curve cryptography, side-channel attacks
54Pradeep Kumar Mishra Efficient Simultaneous Inversion in Parallel and Application to Point Multiplication in ECC. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Montgomery ladder, simultaneous inversion, parallel algorithm, Elliptic Curve Cryptosystems, Scalar Multiplication
54Nicolas Méloni, M. Anwar Hasan Elliptic Curve Scalar Multiplication Combining Yao's Algorithm and Double Bases. Search on Bibsonomy CHES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Zeckendorf representation, point scalar multiplication, Yao’s algorithm, elliptic curve, Double-base number system
53Loren D. Olson Side-Channel Attacks in ECC: A General Technique for Varying the Parametrization of the Elliptic Curve. Search on Bibsonomy CHES The full citation details ... 2004 DBLP  DOI  BibTeX  RDF weighted projective curves, uniform addition formula, cryptography, ECC, side-channel attacks, Elliptic curves
52Yasuyuki Sakai, Kouichi Sakurai Simple Power Analysis on Fast Modular Reduction with NIST Recommended Elliptic Curves. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF generalized Mersenne prime, unified code, elliptic curve cryptosystem, Side channel analysis, modular reduction
52Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms. Search on Bibsonomy ICISC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Endomorphism, Elliptic Curve Cryptosystem, Scalar Multiplication, Frobenius Expansion
51Steven D. Galbraith, Florian Hess, Nigel P. Smart Extending the GHS Weil Descent Attack. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
51Markus Maurer, Alfred Menezes, Edlyn Teske Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree. Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
51Abdulah Abdulah Zadeh High performance synchronized dual elliptic curve crypto-processor. Search on Bibsonomy CCECE The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
51Chester Rebeiro, Debdeep Mukhopadhyay High Speed Compact Elliptic Curve Cryptoprocessor for FPGA Platforms. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
51Maurice Keller, William P. Marnane Low Power Elliptic Curve Cryptography. Search on Bibsonomy PATMOS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
51Biswajit Panja, Sanjay Kumar Madria An Energy and Communication Efficient Group Key in Sensor Networks Using Elliptic Curve Polynomial. Search on Bibsonomy ADHOC-NOW The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
51Huaqun Wang, Shuping Zhao, Guoxing Jiang Key management based on elliptic curve Paillier scheme in ad hoc networks. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
51Seog Chung Seo, Hyung Chan Kim, Rudrapatna S. Ramakrishna A New Security Protocol Based on Elliptic Curve Cryptosystems for Securing Wireless Sensor Networks. Search on Bibsonomy EUC Workshops The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
51SeongHan Shin, Kazukuni Kobara, Hideki Imai An Elliptic Curve Based Authenticated Key Agreement Protocol for Wireless Security. Search on Bibsonomy CIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2383 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license